Fortinet Annual Security Conference Outlines Strategies to Secure Enterprises in India

2nd November 2016 | By Mouseworld Now Correspondent |

Fortinet-logoBangalore, India, 2nd November, 2016: Fortinet, a leading cyber security solutions player, conducted its annual Security Conference for Indian CIOs in Moscow, Russia. At the Fortinet annual Security Conference for Indian CIOs conference attended by over 100 CIOs from SAARC, Fortinet emphasised that the best way to secure complicated networked environments was simplicity and recommended the implementation of Segmentation, Universal Policy and Collaborative Intelligence as three important strategies for securing evolving environments.

Joe Sarno, Vice President, International Emerging, MEA, Eastern Europe, India & SAARC, Fortinet said: “Data centers are evolving along with customer demands for fast and secure cloud infrastructure and services. The growth of IoT devices and traffic represents both an opportunity and a threat to today’s digital businesses. Having a comprehensive security strategy, including a single pane-of-glass view of security management and policy across IoT to Cloud, is essential in establishing a consistent security posture for an organization.”

Fortinet outlined 3 key strategies to help organizations in India protect their businesses: Segmentation, Collaborative intelligence, and Universal policy.

Segmentation – Networks need to be intelligently segmented into functional security zones. End to end segmentation, from IoT to the cloud, and across physical and virtual environments, provides deep visibility into traffic that moves laterally across the distributed network, limits the spread of malware, and allows for the identification and quarantining of infected devices.

Collaborative intelligence – Local and global threat intelligence needs to be shared between security devices, and a coordinated response between devices needs to be orchestrated centrally.

Universal policy – A centralized security policy engine that determines trust levels between network segments, collects real time threat information, establishes a unified security policy, and distributes appropriate orchestrated policy enforcement.

Fortinet also introduced its new Security Fabric architecture. This architecture is designed to integrate security technologies for the endpoint, access layer, network, applications, data center, content, and cloud into a single collaborative security solution that can be orchestrated through a single management interface.

Fortinet security experts also highlighted that the region is tipped to be at the forefront of IoT growth, with market researcher IDC estimating that Asia-Pacific’s industries will connect 8.6 billion things by 2019,

As IoT devices are subjected to a wide variety of attacks including targeted code injection, physical alteration of firmware, man-in-the-middle attacks, remote control of devices to alter or disable their functionality, spoofing, or simply hiding of malware in the volume of IoT data, they are becoming a security nightmare for CIOs.

“It’s clear that isolated security devices don’t solve today’s cybersecurity challenges, and companies need something different. They want integrated security, from IoT to the cloud, with actionable analytics across their multi-vendor networking and security solutions, all delivered through a single pane of glass view,” said Sarno. “Fortinet’s Security Fabric has delivered on this technology vision with a complete rethinking of security for customers to implement more strategic approaches to stay ahead of the threat landscape.”

“With increasing business dependence on technology, security issues too are on the rise. As our networks become more complicated, the tendency is to add new security devices to an already overburdened network. The Fortinet VIP Forum, through its knowledge gaining session, has emphasised that complexity is the enemy of security. Siloed security solutions with separate management interfaces and no meaningful way to gather or share threat information with other devices on your network are only marginally useful,” said Amirthavalavan, Senior Program Architect, TAFE.

Prabhu P, Director – Network & Infrastructure, Zoho Corporation, said, “Online and mobile transactions have become commonplace and organizations moving to embrace and enable this new digital economy face increased security and data risks. Innovative attacks are aimed at exploiting loopholes as businesses start to share more customer data between branches, mobile users, and even through the cloud. The VIP Forum outlined a holistic security strategy to help enterprises get prepared in advance for emerging technologies and their security threats. ”

Tags: , , , , , , , , , , , , , , ,

Leave your comment

IMPORTANT! To be able to proceed, you need to solve the following simple math

What is 9 + 3 ?
Please leave these two fields as-is:

Mouseworldnow Videos
  • r chandrashekhar president nasscom
  • Anant Maheshwari, President, Microsoft India
  • Suresh_Vaswani-220 by 220

Channel News

  • Capillary Technologies Attains AWS Retail Competency Status more...
  • MG Motor Opens its first digital car-less showroom, MG Digital Studio more...
  • Globus Infocom to Participate in InfoComm India 2019 Expo more...
  • ASUS Opens New ASUS Exclusive Store in B’lore more...
  • COMPUTEX 2019 Successfully Comes to a Close at Taipei more...
dell for SMEs
Subscribe via email

Enter your email address:

What does the mouse ask?

Will the spurt in online video advertisement steal the twinkle from the TV ad platform?

View Results

Loading ... Loading ...
Newsletter Registration